Applications of Galois Geometries to Coding Theory and Cryptography

Size: px
Start display at page:

Download "Applications of Galois Geometries to Coding Theory and Cryptography"

Transcription

1 Applications of Galois Geometries to Coding Theory and Cryptography Ghent University Dept. of Mathematics Krijgslaan Building S Ghent Belgium Albena, July 1, 2013

2 1. Affine spaces 2. Projective spaces OUTLINE 1 GALOIS GEOMETRIES 1. Affine spaces 2. Projective spaces 2 GEOMETRY AND CRYPTOGRAPHY

3 1. Affine spaces 2. Projective spaces FINITE FIELDS q = prime number. Prime fields F q = {0, 1,..., q 1} (mod q). Binary field F 2 = {0, 1}. Ternary field F 3 = {0, 1, 2} = { 1, 0, 1}. Finite fields F q : q prime power.

4 1. Affine spaces 2. Projective spaces AFFINE SPACE AG(n, q) V (n, q) = n-dimensional vector space over F q. AG(n, q) = V (n, q) plus parallelism. k-dimensional affine subspace = (translate) of k-dimensional vector space.

5 1. Affine spaces 2. Projective spaces PARALLELISM IN AFFINE SPACE AG(n, q) Let Π k be k-dimensional vector space of V (n, q). Π k + b, for b V (n, q), are the affine k-subspaces parallel to Π k. Two parallel affine k-subspaces are disjoint or equal. Parallelism leads to partitions of AG(n, q) into (parallel) affine k-subspaces.

6 1. Affine spaces 2. Projective spaces AFFINE PLANE AG(2, 3) OF ORDER 3

7 1. Affine spaces 2. Projective spaces FROM V (3, q) TO PG(2, q)

8 1. Affine spaces 2. Projective spaces FROM V (3, q) TO PG(2, q)

9 1. Affine spaces 2. Projective spaces THE FANO PLANE PG(2, 2)

10 1. Affine spaces 2. Projective spaces THE FANO PLANE PG(2, 2) Gino Fano ( )

11 1. Affine spaces 2. Projective spaces THE PLANE PG(2, 3)

12 1. Affine spaces 2. Projective spaces FROM V (4, q) TO PG(3, q)

13 1. Affine spaces 2. Projective spaces FROM V (4, q) TO PG(3, q)

14 1. Affine spaces 2. Projective spaces PG(3, 2)

15 1. Affine spaces 2. Projective spaces FROM V (n + 1, q) TO PG(n, q) 1 From V (1, q) to PG(0, q) (projective point), 2 From V (2, q) to PG(1, q) (projective line), 3 4 From V (i + 1, q) to PG(i, q) (i-dimensional projective subspace), 5 6 From V (n, q) to PG(n 1, q) ((n 1)-dimensional subspace = hyperplane), 7 From V (n + 1, q) to PG(n, q) (n-dimensional space).

16 1. Affine spaces 2. Projective spaces LINK BETWEEN AFFINE AND PROJECTIVE SPACES AG(n, q) = PG(n, q) minus one hyperplane (the hyperplane at infinity).

17 1. Affine spaces 2. Projective spaces LINK BETWEEN AG(2, 3) AND PG(2, 3)

18 OUTLINE Galois geometries 1 GALOIS GEOMETRIES 1. Affine spaces 2. Projective spaces 2 GEOMETRY AND CRYPTOGRAPHY

19 SECRET SHARING SCHEME 1 Secret sharing scheme: cryptographic equivalent of vault that needs several keys to be opened. 2 Secret S divided into shares. 3 Authorised sets: have access to secret S by putting their shares together. 4 Unauthorised sets: have no access to secret S by putting their shares together.

20 (n, k)-threshold SCHEME 1 n participants. 2 Each group of k participants can reconstruct secret S, but less than k participants have no way to learn anything about secret S.

21 SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME 1 F q = finite field of order q. 2 Dealer chooses polynomial f (X) = f 0 + f 1 X + + f k 1 X k 1 F q [X], and, 3 gives participant number i, point (x i, f (x i )) on graph of f (x i 0). 4 Value f (0) = f 0 is secret S.

22 SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME 1 Set of k participants can reconstruct f (X) = f 0 + f 1 X + + f k 1 X k 1 by interpolating their shares (x i, f (x i )). Then they can compute secret f (0). 2 If k < k persons try to reconstruct secret, for every y F q, there are exactly F q k k 1 polynomials of degree at most k 1 which pass through their shares and the point (0, y). Thus they gain no information about f (0).

23 Galois geometries REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME secret point S 1 S 5 S 2 S 3 S 4

24 GEOMETRICAL REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME (BLAKLEY) 1 Secret S = point of PG(3, q). 2 Shares = planes of PG(3, q) such that exactly three of them only intersect in S. 3 Classical example: Normal rational curve of planes X 0 + tx 1 + t 2 X 2 + t 3 X 3 = 0, t F q, and X 3 = 0.

25 GEOMETRICAL REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME (BLAKLEY) 1 Secret S = point of PG(k, q). 2 Shares = hyperplanes of PG(k, q) such that exactly k of them only intersect in S. 3 Classical example: Normal rational curve of hyperplanes X 0 + tx 1 + t 2 X t k X k = 0, t F q, and X k = 0.

26 GEOMETRICAL REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME (BLAKLEY)

27 GEOMETRICAL REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME

28 GEOMETRICAL REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME

29 CODING-THEORETICAL REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME (McEliece and Sarwate) 1 C : [n + 1, k, n k + 2] q MDS code. 2 For secret c 0 F q, dealer creates codeword c = (c 0, c 1,..., c n ) C. Share of participant number i is symbol c i. 3 Since C is MDS code with minimum distance n k + 2, codeword c can be uniquely reconstructed if only k symbols are known. 4 So any set of k persons can compute secret c 0. 5 On the other hand, less than k persons do not learn anything about secret, since for any possible secret c, the same number of codewords that fit to secret c and their shares exist.

30 MORE GENERAL SECRET SHARING SCHEME DEFINITION Support of c = (c 1,..., c n ) F n q : sup(c) = {i c i 0}. Let C be linear code. Nonzero codeword c C is called minimal if ρ F q \ {0}. c C \ {0} : sup(c ) sup(c) = c = ρc, (In binary case, c minimal if no non-zero codeword c with sup(c ) sup(c), sup(c ) sup(c))

31 MORE GENERAL SECRET SHARING SCHEME LEMMA (MASSEY) Let C be an [n + 1, k] q -code. Secret sharing scheme is constructed from C by choosing codeword c = (c 0,..., c n ). Secret is c 0 and shares of participants are coordinates c i (1 i n). Minimal authorized sets of secret sharing scheme correspond to minimal codewords of C with 0 in their supports.

32 BINARY REED-MULLER CODES DEFINITION Binary r-th order Reed-Muller code RM(r, m) (0 r m) = set of all binary vectors f of length n = 2 m associated with Boolean polynomials f (x 1, x 2,..., x m ) of degree at most r: c = (f (0,..., 0),..., f (1,..., 1)). Minimum weight d = 2 m r. Minimum weight codewords of RM(r, m) = incidence vectors of AG(m r, 2) in AG(m, 2).

33 BINARY REED-MULLER CODES THEOREM (KASAMI, TOKURA, AND AZUMI) Let f (x 1,..., x m ) be Boolean function of degree at most r, where r 2, such that sup(f ) < 2 m r+1. Then f can be transformed by an affine transformation into f = x 1 x r 2 (x r 1 x r + +x r+2µ 3 x r+2µ 2 ), 2 2µ m r +2, or f = x 1 x r µ (x r µ+1 x r +x r+1 x r+µ ), 3 µ r, µ m r.

34 BINARY REED-MULLER CODES First type of codewords (1) f = x 1 x r 2 (x r 1 x r + +x r+2µ 3 x r+2µ 2 ), 2 2µ m r+2, In PG(m r + 2, 2) defined by X 1 = X 0,..., X r 2 = X 0, cone Ψ with vertex PG(m r + 1 2µ, 2) at infinity, and base non-singular parabolic quadric Q(2µ, 2) in 2µ dimensions having non-singular hyperbolic quadric at infinity.

35 QUADRATIC CONE Galois geometries

36 BINARY REED-MULLER CODES Second type of codewords (2) f = x 1 x r µ (x r µ+1 x r +x r+1 x r+µ ), 3 µ r, µ m r. (Symmetric difference): Union of two (m r)-dimensional affine spaces α and β, but not (m r µ)-dimensional affine intersection space α β.

37 SYMMETRIC DIFFERENCE

38 COUNTING NON-MINIMAL CODEWORDS IN RM(r, m) Non-minimal codeword c = c 1 + c 2, with c 1, c 2 non-zero codewords having disjoint supports. For w(c) < 3 2 m r, c 1 codeword of smallest weight 2 m r, and c 2 codeword of weight 2 m r or quadric or symmetric difference. Number of non-minimal codewords c of weight 2 2 m r calculated by Borissov, Manev, and Nikova. Number of non-minimal codewords c of weight 2 2 m r < w(c) < 3 2 m r calculated by Schillewaert, Storme, and Thas.

39 COUNTING NON-MINIMAL CODEWORDS IN RM(r, m)

40 PROBLEM OF AUTHENTICATION 1 Problem: Alice wants to send Bob a message m. 2 Attacker intercepts m and sends alternated message m to Bob.

41 PROBLEM OF AUTHENTICATION How can Bob be sure that message he gets is correct? Introduce authentication!

42 EXAMPLE OF MESSAGE AUTHENTICATION CODE 1 l = line of PG(2, q). 2 Message m = point of l. 3 Authentication key K = point in PG(2, q)\l. 4 Authentication tag = line through message m and key K.

43

44 EXAMPLE OF AUTHENTICATION CODE 1 If attacker wants to create message (m, K ) without knowing key K, he must guess an affine line through m. There are q possibilities, i.e. the chance for correct attack is 1 q. 2 If attacker already knows authenticated message (m, K ), he knows that key K must lie on the line mk. But for every of q affine points on line mk, there exists line through m. So he cannot do better than guess the key which gives probability of 1 q for successful attack.

45 SECURITY OF AUTHENTICATION CODE 1 p i = probability of attacker to construct pair (m, K ) without knowledge of key K, if he only knows i different pairs (m j, K ). 2 Smallest value r for which p r+1 = 1 is called order of authentication code. 3 For r = 1, p 0 = probability of impersonation attack and probability p 1 = probability of substitution attack. THEOREM If MAC has attack probabilities p i = 1/n i (0 i r), then K n 0 n r. MAC that satisfies this theorem with equality is called perfect.

46 GEOMETRICAL CONSTRUCTION OF PERFECT MAC DEFINITION Generalised dual arc D of order l with dimensions d 1 > d 2 > > d l+1 of PG(n, q) is set of subspaces of dimension d 1 such that: 1 each j subspaces intersect in subspace of dimension d j, 1 j l + 1, 2 each l + 2 subspaces have no common intersection. (n, d 1,..., d l+1 ) = parameters of dual arc.

47 GENERALISED DUAL ARCS THEOREM There exists generalised dual arc in PG( ( ) n+d+1 d+1 1, q), with dimensions d i = ( ) n+d+1 i d+1 i 1, i = 0,..., d Spaces have dimension d 1 = ( ) n+d 1. 2 Two spaces intersect in space of dimension d 2 = ( ) n+d 1 d Three spaces intersect in space of dimension d 3 = ( ) n+d d 2 d

48 LINK BETWEEN MAC AND GENERALISED DUAL ARC 1 π = hyperplane of PG(n + 1, q) and D = generalised dual arc of order l in π with parameters (n, d 1,..., d l+1 ). 2 message m = element of D. 3 key K = point of PG(n + 1, q) not in π. 4 Authentication tag that belongs to message m and key K is generated (d 1 + 1)-dimensional subspace. 5 Perfect MAC of order r = l + 1 with attack probabilities p i = q d i+1 d i.

49

50

51

52 ANONYMOUS DATABASE SEARCH Anonymous database search: query a database anonomously. Peer-to-peer community: let users post queries on behalf of each other. Neighbourhood attack: can be modeled as the intersection of neighbourhoods that may return a single identified person in case of unique neighbourhoods. k-anonymous neighbourhoods: neighbourhood of person is also neighbourhood of at least k 1 other persons.

53

54 TRANSVERSAL DESIGNS Transversal design TD λ (k, n) = k-uniform structure (P, L) of points and blocks, with P = kn, that admits partition of P in k groups of cardinality n, and that satisfies: any group and block contain exactly one common point, every pair of points from distinct groups is contained in exactly λ blocks.

55 FROM AG(2, n) TO TD 1 (k, n) From affine plane AG(2, n) to transversal design TD 1 (k, n), 2 k n. Point set P of TD 1 (k, n) = points of AG(2, n) on k lines of one parallel class of AG(2, n), Groups = lines from this parallel class, Blocks of TD 1 (k, n) = lines of the other parallel classes of AG(2, n), restricted to the points in P.

56 FROM AG(2, n) TO TD 1 (k, n)

57 TRANSVERSAL DESIGN TD 1 (k, n) AND n-anonymous NEIGHBOURHOODS THEOREM Transversal design TD 1 (k, n) has n-anonymous neighbourhoods.

58 THEOREMS Galois geometries THEOREM (STOKES AND FARRÀS) Combinatorial (v, b, r, k)-configuration with n-anonymous neighbourhoods satisfies: There exists partition G = {g i } m i=1 of the point set such that the points in the same part are not collinear and g i n, for all i {1,..., m}, r n and m k.

59 THEOREMS Galois geometries THEOREM (STOKES AND FARRÀS) In combinatorial (v, b, r, k)-configuration C with n-anonymous neighbourhoods and anonymity partition G = {g i } m i=1 and g i = n for all i {1,..., m}, v = n iff m = k. In this case, C is transversal design TD 1 (k, n), and v = kn and b = n 2.

60 APPLICATION IN PAY TELEVISION (Korjik, Ivkov, Merinovich, Barg, and van Tilborg) subscribers = points of PG(2, q), codes = lines of PG(2, q), subscriber quits: codes of lines become invalid, new issue of codes: only necessary when codes of all lines through subscriber become invalid.

61 THE FANO PLANE PG(2, 2)

62 REFERENCES Galois geometries W.-A. Jackson, K.M. Martin, and C.M. O Keefe, Geometrical contributions to secret sharing theory. J. Geom. 79 (2004), W.-A. Jackson, K.M. Martin, and M.B. Paterson, Applications of Galois geometry to cryptology. Chapter in Current research topics in Galois geometry (J. De Beule and L. Storme, Eds.), NOVA Academic Publishers (2012),

63 Thank you very much for your attention!

Applications of finite geometry in coding theory and cryptography

Applications of finite geometry in coding theory and cryptography Applications of finite geometry in coding theory and cryptography A. KLEIN, L. STORME Department of Mathematics, Ghent University, Krijgslaan 281 - Building S22, 9000 Ghent, Belgium (Email: {klein,ls}@cage.ugent.be)

More information

Galois geometries contributing to coding theory

Galois geometries contributing to coding theory Ghent University Dept. of Pure Mathematics and Computer Algebra Krijgslaan 281 - S22 9000 Ghent Belgium Thurnau, April 15, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 EXTENDABILITY RESULTS

More information

Galois geometries contributing to coding theory

Galois geometries contributing to coding theory Ghent University Dept. of Mathematics Krijgslaan 281 - S22 9000 Ghent Belgium Opatija, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 COVERING RADIUS AND SATURATING SETS 4 LINEAR MDS CODES

More information

Functional codes arising from quadric intersections with Hermitian varieties

Functional codes arising from quadric intersections with Hermitian varieties Functional codes arising from quadric intersections with Hermitian varieties A. Hallez L. Storme June 16, 2010 Abstract We investigate the functional code C h (X) introduced by G. Lachaud [10] in the special

More information

Linear Point Sets and Rédei Type k-blocking

Linear Point Sets and Rédei Type k-blocking Journal of Algebraic Combinatorics 14 (2001), 221 228 c 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Linear Point Sets and Rédei Type k-blocking Sets in PG(n, q) L. STORME ls@cage.rug.ac.be

More information

On the structure of the directions not determined by a large affine point set

On the structure of the directions not determined by a large affine point set On the structure of the directions not determined by a large affine point set Jan De Beule, Peter Sziklai, and Marcella Takáts January 12, 2011 Abstract Given a point set U in an n-dimensional affine space

More information

Secret sharing schemes

Secret sharing schemes Secret sharing schemes Martin Stanek Department of Computer Science Comenius University stanek@dcs.fmph.uniba.sk Cryptology 1 (2017/18) Content Introduction Shamir s secret sharing scheme perfect secret

More information

Characterizations of the finite quadric Veroneseans V 2n

Characterizations of the finite quadric Veroneseans V 2n Characterizations of the finite quadric Veroneseans V 2n n J. A. Thas H. Van Maldeghem Abstract We generalize and complete several characterizations of the finite quadric Veroneseans surveyed in [3]. Our

More information

On small minimal blocking sets in classical generalized quadrangles

On small minimal blocking sets in classical generalized quadrangles On small minimal blocking sets in classical generalized quadrangles Miroslava Cimráková a Jan De Beule b Veerle Fack a, a Research Group on Combinatorial Algorithms and Algorithmic Graph Theory, Department

More information

Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q)

Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) M. Lavrauw L. Storme G. Van de Voorde October 4, 2007 Abstract In this paper, we study the p-ary linear code C k (n, q),

More information

Finite affine planes in projective spaces

Finite affine planes in projective spaces Finite affine planes in projective spaces J. A.Thas H. Van Maldeghem Ghent University, Belgium {jat,hvm}@cage.ugent.be Abstract We classify all representations of an arbitrary affine plane A of order q

More information

Lax embeddings of the Hermitian Unital

Lax embeddings of the Hermitian Unital Lax embeddings of the Hermitian Unital V. Pepe and H. Van Maldeghem Abstract In this paper, we prove that every lax generalized Veronesean embedding of the Hermitian unital U of PG(2, L), L a quadratic

More information

SUBSTRUCTURES OF FINITE CLASSICAL POLAR SPACES

SUBSTRUCTURES OF FINITE CLASSICAL POLAR SPACES In: Current Research Topics in Galois Geometry Editors: J. De Beule and L. Storme, pp. 33-59 ISBN 978-1-61209-523-3 c 2011 Nova Science Publishers, Inc. Chapter 2 SUBSTRUCTURES OF FINITE CLASSICAL POLAR

More information

A characterization of the finite Veronesean by intersection properties

A characterization of the finite Veronesean by intersection properties A characterization of the finite Veronesean by intersection properties J. Schillewaert, J.A. Thas and H. Van Maldeghem AMS subject classification: 51E0, 51A45 Abstract. A combinatorial characterization

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security Outline Authentication CPSC 467b: Cryptography and Computer Security Lecture 18 Michael J. Fischer Department of Computer Science Yale University March 29, 2010 Michael J. Fischer CPSC 467b, Lecture 18

More information

Introduction to Cryptography Lecture 13

Introduction to Cryptography Lecture 13 Introduction to Cryptography Lecture 13 Benny Pinkas June 5, 2011 Introduction to Cryptography, Benny Pinkas page 1 Electronic cash June 5, 2011 Introduction to Cryptography, Benny Pinkas page 2 Simple

More information

Generalized Veronesean embeddings of projective spaces, Part II. The lax case.

Generalized Veronesean embeddings of projective spaces, Part II. The lax case. Generalized Veronesean embeddings of projective spaces, Part II. The lax case. Z. Akça A. Bayar S. Ekmekçi R. Kaya J. A. Thas H. Van Maldeghem Abstract We classify all embeddings θ : PG(n, K) PG(d, F),

More information

Two-intersection sets with respect to lines on the Klein quadric

Two-intersection sets with respect to lines on the Klein quadric Two-intersection sets with respect to lines on the Klein quadric F. De Clerck N. De Feyter N. Durante Abstract We construct new examples of sets of points on the Klein quadric Q + (5, q), q even, having

More information

Journal of Discrete Mathematical Sciences & Cryptography Vol. 9 (2006), No. 1, pp

Journal of Discrete Mathematical Sciences & Cryptography Vol. 9 (2006), No. 1, pp Some generalizations of Rédei s theorem T. Alderson Department of Mathematical Sciences University of New Brunswick Saint John, New Brunswick Canada EL 4L5 Abstract By the famous theorems of Rédei, a set

More information

Characterizations of Veronese and Segre Varieties

Characterizations of Veronese and Segre Varieties Characterizations of Veronese and Segre Varieties Joseph A. Thas and Hendrik Van Maldeghem Dedicated to the memory of A. Barlotti Abstract. We survey the most important characterizations of quadric Veroneseans

More information

On sets without tangents and exterior sets of a conic

On sets without tangents and exterior sets of a conic On sets without tangents and exterior sets of a conic Geertrui Van de Voorde Abstract A set without tangents in PG(2, q) is a set of points S such that no line meets S in exactly one point. An exterior

More information

Elliptic Curve Cryptography

Elliptic Curve Cryptography Elliptic Curve Cryptography Elliptic Curves An elliptic curve is a cubic equation of the form: y + axy + by = x 3 + cx + dx + e where a, b, c, d and e are real numbers. A special addition operation is

More information

Tight Sets and m-ovoids of Quadrics 1

Tight Sets and m-ovoids of Quadrics 1 Tight Sets and m-ovoids of Quadrics 1 Qing Xiang Department of Mathematical Sciences University of Delaware Newark, DE 19716 USA xiang@mathudeledu Joint work with Tao Feng and Koji Momihara 1 T Feng, K

More information

Local correctability of expander codes

Local correctability of expander codes Local correctability of expander codes Brett Hemenway Rafail Ostrovsky Mary Wootters IAS April 4, 24 The point(s) of this talk Locally decodable codes are codes which admit sublinear time decoding of small

More information

European Journal of Combinatorics. Locally subquadrangular hyperplanes in symplectic and Hermitian dual polar spaces

European Journal of Combinatorics. Locally subquadrangular hyperplanes in symplectic and Hermitian dual polar spaces European Journal of Combinatorics 31 (2010) 1586 1593 Contents lists available at ScienceDirect European Journal of Combinatorics journal homepage: www.elsevier.com/locate/ejc Locally subquadrangular hyperplanes

More information

How to Build Robust Shared Control Systems

How to Build Robust Shared Control Systems Designs, Codes and Cryptography, 15, 111?? (1998) c 1998 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. How to Build Robust Shared Control Systems ROSS ANDERSON rja14@cl.cam.ac.uk

More information

On Ferri s characterization of the finite quadric Veronesean V 4 2

On Ferri s characterization of the finite quadric Veronesean V 4 2 On Ferri s characterization of the finite quadric Veronesean V 4 2 J. A. Thas H. Van Maldeghem Abstract We generalize and complete Ferri s characterization of the finite quadric Veronesean V2 4 by showing

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 19 November 8, 2017 CPSC 467, Lecture 19 1/37 Zero Knowledge Interactive Proofs (ZKIP) ZKIP for graph isomorphism Feige-Fiat-Shamir

More information

On the geometry of regular hyperbolic fibrations

On the geometry of regular hyperbolic fibrations On the geometry of regular hyperbolic fibrations Matthew R. Brown Gary L. Ebert Deirdre Luyckx January 11, 2006 Abstract Hyperbolic fibrations of PG(3, q) were introduced by Baker, Dover, Ebert and Wantz

More information

Hyperplanes of Hermitian dual polar spaces of rank 3 containing a quad

Hyperplanes of Hermitian dual polar spaces of rank 3 containing a quad Hyperplanes of Hermitian dual polar spaces of rank 3 containing a quad Bart De Bruyn Ghent University, Department of Mathematics, Krijgslaan 281 (S22), B-9000 Gent, Belgium, E-mail: bdb@cage.ugent.be Abstract

More information

Division Property: a New Attack Against Block Ciphers

Division Property: a New Attack Against Block Ciphers Division Property: a New Attack Against Block Ciphers Christina Boura (joint on-going work with Anne Canteaut) Séminaire du groupe Algèbre et Géometrie, LMV November 24, 2015 1 / 50 Symmetric-key encryption

More information

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment. CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES A selection of the following questions will be chosen by the lecturer to form the Cryptology Assignment. The Cryptology Assignment is due by 5pm Sunday 1

More information

Two-character sets as subsets of parabolic quadrics

Two-character sets as subsets of parabolic quadrics Two-character sets as subsets of parabolic uadrics Bart De Bruyn Ghent University Department of Mathematics Krijgslaan 81 (S) B-9000 Gent Belgium E-mail: bdb@cageugentbe Abstract A two-character set is

More information

Generalized quadrangles and the Axiom of Veblen

Generalized quadrangles and the Axiom of Veblen Geometry, Combinatorial Designs and Related Structures (ed. J. W. P. Hirschfeld), Cambridge University Press, London Math. Soc. Lecture Note Ser. 245 (1997), 241 -- 253 Generalized quadrangles and the

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 18 November 3, 2014 CPSC 467, Lecture 18 1/43 Zero Knowledge Interactive Proofs (ZKIP) Secret cave protocol ZKIP for graph isomorphism

More information

Finite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures p. 1/2

Finite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures p. 1/2 Finite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures Vladimir D. Tonchev a Department of Mathematical Sciences Michigan Technological University Houghton, Michigan 49931,

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Theorems of Erdős-Ko-Rado type in polar spaces

Theorems of Erdős-Ko-Rado type in polar spaces Theorems of Erdős-Ko-Rado type in polar spaces Valentina Pepe, Leo Storme, Frédéric Vanhove Department of Mathematics, Ghent University, Krijgslaan 28-S22, 9000 Ghent, Belgium Abstract We consider Erdős-Ko-Rado

More information

Optimal Ramp Schemes and Related Combinatorial Objects

Optimal Ramp Schemes and Related Combinatorial Objects Optimal Ramp Schemes and Related Combinatorial Objects Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo BCC 2017, Glasgow, July 3 7, 2017 1 / 18 (t, n)-threshold Schemes

More information

A spectrum result on minimal blocking sets with respect to the planes of PG(3, q), q odd

A spectrum result on minimal blocking sets with respect to the planes of PG(3, q), q odd A spectrum result on minimal blocking sets with respect to the planes of PG(3, q), q odd C. Rößing L. Storme January 12, 2010 Abstract This article presents a spectrum result on minimal blocking sets with

More information

Characterizations of Segre Varieties

Characterizations of Segre Varieties Characterizations of Segre Varieties J. A Thas H. Van Maldeghem Abstract In this paper several characterizations of Segre varieties and their projections are given. The first two characterization theorems

More information

On the nucleus of the Grassmann embedding of the symplectic dual polar space DSp(2n, F), char(f) = 2

On the nucleus of the Grassmann embedding of the symplectic dual polar space DSp(2n, F), char(f) = 2 On the nucleus of the Grassmann embedding of the symplectic dual polar space DSp(2n, F), char(f) = 2 Rieuwert J. Blok Department of Mathematics and Statistics Bowling Green State University Bowling Green,

More information

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography CS 7880 Graduate Cryptography September 10, 2015 Lecture 1: Perfect Secrecy and Statistical Authentication Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Definition of perfect secrecy One-time

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 18 November 6, 2017 CPSC 467, Lecture 18 1/52 Authentication While Preventing Impersonation Challenge-response authentication protocols

More information

Perfect Secret Sharing Schemes from Room Squares

Perfect Secret Sharing Schemes from Room Squares University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1998 Perfect Secret Sharing Schemes from Room Squares G. R. Chaudhry University

More information

Perfect Secret Sharing Schemes from Room. Squares. Ghulam-Rasool Chaudhry. Centre for Computer Security Research. University of Wollongong

Perfect Secret Sharing Schemes from Room. Squares. Ghulam-Rasool Chaudhry. Centre for Computer Security Research. University of Wollongong Perfect Secret Sharing Schemes from Room Squares Ghulam-Rasool Chaudhry Hossein Ghodosi Jennifer Seberry Department of Computer Science Centre for Computer Security Research University of Wollongong Wollongong,

More information

MINIMAL CODEWORDS IN LINEAR CODES. Yuri Borissov, Nickolai Manev

MINIMAL CODEWORDS IN LINEAR CODES. Yuri Borissov, Nickolai Manev Serdica Math. J. 30 (2004, 303 324 MINIMAL CODEWORDS IN LINEAR CODES Yuri Borissov, Nickolai Manev Communicated by V. Brînzănescu Abstract. Cyclic binary codes C of block length n = 2 m 1 and generator

More information

Semifield flocks, eggs, and ovoids of Q(4, q)

Semifield flocks, eggs, and ovoids of Q(4, q) Semifield flocks, eggs, and ovoids of Q(4, q) Michel Lavrauw Universita degli studi di Napoli Federico II Dipartimento di Matematica e Applicazioni R. Caccioppoli Via Cintia Complesso Monte S. Angelo 80126

More information

Secret Sharing CPT, Version 3

Secret Sharing CPT, Version 3 Secret Sharing CPT, 2006 Version 3 1 Introduction In all secure systems that use cryptography in practice, keys have to be protected by encryption under other keys when they are stored in a physically

More information

Polynomials and Codes

Polynomials and Codes TU/e Eindhoven 13 September, 2012, Trieste ICTP-IPM Workshop and Conference in Combinatorics and Graph Theory. Reza and Richard: Thanks for a wonderful meeting. From now on: p is prime and q is a power

More information

The maximum size of a partial spread in H(4n + 1,q 2 ) is q 2n+1 + 1

The maximum size of a partial spread in H(4n + 1,q 2 ) is q 2n+1 + 1 The maximum size of a partial spread in H(4n +, 2 ) is 2n+ + Frédéric Vanhove Dept. of Pure Mathematics and Computer Algebra, Ghent University Krijgslaan 28 S22 B-9000 Ghent, Belgium fvanhove@cage.ugent.be

More information

Codes from generalized hexagons

Codes from generalized hexagons Codes from generalized hexagons A. De Wispelaere H. Van Maldeghem 1st March 2004 Abstract In this paper, we construct some codes that arise from generalized hexagons with small parameters. As our main

More information

Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs

Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Jonah Brown-Cohen 1 Introduction The Diffie-Hellman protocol was one of the first methods discovered for two people, say Alice

More information

Shult Sets and Translation Ovoids of the Hermitian Surface

Shult Sets and Translation Ovoids of the Hermitian Surface Shult Sets and Translation Ovoids of the Hermitian Surface A. Cossidente, G. L. Ebert, G. Marino, and A. Siciliano Abstract Starting with carefully chosen sets of points in the Desarguesian affine plane

More information

A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors

A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors Qian Guo Thomas Johansson Paul Stankovski Dept. of Electrical and Information Technology, Lund University ASIACRYPT 2016 Dec 8th, 2016

More information

About Maximal Partial 2-Spreads in PG(3m 1, q)

About Maximal Partial 2-Spreads in PG(3m 1, q) Innovations in Incidence Geometry Volume 00 (XXXX), Pages 000 000 ISSN 1781-6475 About Maximal Partial 2-Spreads in PG(3m 1, q) Sz. L. Fancsali and P. Sziklai Abstract In this article we construct maximal

More information

Lines in higgledy-piggledy arrangement

Lines in higgledy-piggledy arrangement Lines in higgledy-piggledy arrangement Szabolcs L. Fancsali MTA ELTE Geometric and Algebraic Combinatorics Research Group Budapest, Hungary nudniq@cs.elte.hu Péter Sziklai MTA ELTE Geometric and Algebraic

More information

Lecture 15 - Zero Knowledge Proofs

Lecture 15 - Zero Knowledge Proofs Lecture 15 - Zero Knowledge Proofs Boaz Barak November 21, 2007 Zero knowledge for 3-coloring. We gave a ZK proof for the language QR of (x, n) such that x QR n. We ll now give a ZK proof (due to Goldreich,

More information

Linear Secret-Sharing Schemes for Forbidden Graph Access Structures

Linear Secret-Sharing Schemes for Forbidden Graph Access Structures Linear Secret-Sharing Schemes for Forbidden Graph Access Structures Amos Beimel 1, Oriol Farràs 2, Yuval Mintz 1, and Naty Peter 1 1 Ben Gurion University of the Negev, Be er Sheva, Israel 2 Universitat

More information

Notes 10: Public-key cryptography

Notes 10: Public-key cryptography MTH6115 Cryptography Notes 10: Public-key cryptography In this section we look at two other schemes that have been proposed for publickey ciphers. The first is interesting because it was the earliest such

More information

Secret-sharing with a class of ternary codes

Secret-sharing with a class of ternary codes Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,

More information

Characterizing Ideal Weighted Threshold Secret Sharing

Characterizing Ideal Weighted Threshold Secret Sharing Characterizing Ideal Weighted Threshold Secret Sharing Amos Beimel Tamir Tassa Enav Weinreb October 2, 2006 Abstract Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 16 March 19, 2012 CPSC 467b, Lecture 16 1/58 Authentication While Preventing Impersonation Challenge-response authentication protocols

More information

Constructing Secret Sharing Schemes Based on Cyclic Codes

Constructing Secret Sharing Schemes Based on Cyclic Codes Constructing Secret Sharing Schemes Based on Cyclic Codes By HOO MEI HUI A project report submitted in partial fulfilment of the requirements for the award of Bachelor of Science (Hons.) Applied Mathematics

More information

Every generalized quadrangle of order 5 having a regular point is symplectic

Every generalized quadrangle of order 5 having a regular point is symplectic Every generalized quadrangle of order 5 having a regular point is symplectic Bart De Bruyn Ghent University, Department of Mathematics, Krijgslaan 281 (S22), B-9000 Gent, Belgium, E-mail: bdb@cage.ugent.be

More information

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing Lecture 11: Key Management, Secret Sharing Céline Blondeau Email: celine.blondeau@aalto.fi Department of Computer Science Aalto University, School of Science Key Management Secret Sharing Shamir s Threshold

More information

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Maura B. Paterson Department of Economics, Mathematics and Statistics Birkbeck, University of London Malet Street, London

More information

1 Number Theory Basics

1 Number Theory Basics ECS 289M (Franklin), Winter 2010, Crypto Review 1 Number Theory Basics This section has some basic facts about number theory, mostly taken (or adapted) from Dan Boneh s number theory fact sheets for his

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

Incidence Structures Related to Difference Sets and Their Applications

Incidence Structures Related to Difference Sets and Their Applications aòµ 05B30 ü èµ Æ Òµ 113350 Æ Æ Ø Ø K8: 'u8'é(9ùa^ = Ø K8: Incidence Structures Related to Difference Sets and Their Applications úôœææ Æ Ø ž

More information

Message Authentication Codes (MACs)

Message Authentication Codes (MACs) Message Authentication Codes (MACs) Tung Chou Technische Universiteit Eindhoven, The Netherlands October 8, 2015 1 / 22 About Me 2 / 22 About Me Tung Chou (Tony) 2 / 22 About Me Tung Chou (Tony) Ph.D.

More information

On linear sets on a projective line

On linear sets on a projective line On linear sets on a projective line M. Lavrauw G. Van de Voorde August 14, 2013 Abstract Linear sets generalise the concept of subgeometries in a projective space. They have many applications in finite

More information

Blocking sets of tangent and external lines to a hyperbolic quadric in P G(3, q), q even

Blocking sets of tangent and external lines to a hyperbolic quadric in P G(3, q), q even Manuscript 1 1 1 1 1 1 1 0 1 0 1 0 1 0 1 0 1 Blocking sets of tangent and external lines to a hyperbolic quadric in P G(, q), q even Binod Kumar Sahoo Abstract Bikramaditya Sahu Let H be a fixed hyperbolic

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2018 Identification Identification Non- Repudiation Consider signature- based C- R sk ch=r res = Sig(vk,ch) Bob can prove to police

More information

Secret Sharing Schemes

Secret Sharing Schemes Secret Sharing Schemes 1.1 Introduction 1 1 Handling secret has been an issue of prominence from the time human beings started to live together. Important things and messages have been always there to

More information

Introduction to Modern Cryptography Lecture 11

Introduction to Modern Cryptography Lecture 11 Introduction to Modern Cryptography Lecture 11 January 10, 2017 Instructor: Benny Chor Teaching Assistant: Orit Moskovich School of Computer Science Tel-Aviv University Fall Semester, 2016 17 Tuesday 12:00

More information

Lecture notes on coding theory

Lecture notes on coding theory Lecture notes on coding theory Raymond van Bommel Curves over finite fields, Autumn 2017, Leiden 1 Introduction When one agent tries to transfer information to another agent through a noisy channel, errors

More information

UNIVERSITÀ DEGLI STUDI DI ROMA LA SAPIENZA. Semifield spreads

UNIVERSITÀ DEGLI STUDI DI ROMA LA SAPIENZA. Semifield spreads UNIVERSITÀ DEGLI STUDI DI ROMA LA SAPIENZA Semifield spreads Giuseppe Marino and Olga Polverino Quaderni Elettronici del Seminario di Geometria Combinatoria 24E (Dicembre 2007) http://www.mat.uniroma1.it/~combinat/quaderni

More information

M.D.S. Codes and Arcs in PG(n, q) with q Even: An Improvement of the Bounds of Bruen, Thas, and Blokhuis

M.D.S. Codes and Arcs in PG(n, q) with q Even: An Improvement of the Bounds of Bruen, Thas, and Blokhuis JOURNAL OF COMBINATORIAL THEORY, Series A 62, 139-154 (1993) M.D.S. Codes and Arcs in PG(n, q) with q Even: An Improvement of the Bounds of Bruen, Thas, and Blokhuis L. STORME* AND J. A. THAS Seminar of

More information

Correcting Codes in Cryptography

Correcting Codes in Cryptography EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.

More information

The classification of the largest caps in AG(5, 3)

The classification of the largest caps in AG(5, 3) The classification of the largest caps in AG(5, 3) Y. Edel S. Ferret I. Landjev L. Storme Abstract We prove that 45 is the size of the largest caps in AG(5, 3), and such a 45-cap is always obtained from

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 13 March 3, 2013 CPSC 467b, Lecture 13 1/52 Elliptic Curves Basics Elliptic Curve Cryptography CPSC

More information

Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs

Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs Colleen M. Swanson Computer Science & Engineering Division University of Michigan Ann Arbor, MI 48109,

More information

Public Key Cryptography

Public Key Cryptography T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Public Key Cryptography EECE 412 1 What is it? Two keys Sender uses recipient s public key to encrypt Receiver uses his private key to decrypt

More information

The geometry of secants in embedded polar spaces

The geometry of secants in embedded polar spaces The geometry of secants in embedded polar spaces Hans Cuypers Department of Mathematics Eindhoven University of Technology P.O. Box 513 5600 MB Eindhoven The Netherlands June 1, 2006 Abstract Consider

More information

Secret Sharing. Qi Chen. December 14, 2015

Secret Sharing. Qi Chen. December 14, 2015 Secret Sharing Qi Chen December 14, 2015 What is secret sharing? A dealer: know the secret S and distribute the shares of S to each party A set of n parties P n {p 1,, p n }: each party owns a share Authorized

More information

The geometry of quantum codes. Jürgen Bierbrauer Giorgio Faina Massimo Giulietti Stefano Marcugini Fernanda Pambianco

The geometry of quantum codes. Jürgen Bierbrauer Giorgio Faina Massimo Giulietti Stefano Marcugini Fernanda Pambianco Innovations in Incidence Geometry Volume 6 (2007), Pages 289 307 ISSN 1781-6475 ACADEMIA PRESS The geometry of quantum codes Jürgen Bierbrauer Giorgio Faina Massimo Giulietti Stefano Marcugini Fernanda

More information

Bounds and spectrum results in Galois geometry and coding theory. Eötvös Loránd University

Bounds and spectrum results in Galois geometry and coding theory. Eötvös Loránd University Synopsis of the Ph.D. thesis Bounds and spectrum results in Galois geometry and coding theory Szabolcs Levente Fancsali Eötvös Loránd University Institute of Mathematics Doctoral School: Mathematics Director:

More information

Lax Embeddings of Generalized Quadrangles in Finite Projective Spaces

Lax Embeddings of Generalized Quadrangles in Finite Projective Spaces Lax Embeddings of Generalized Quadrangles in Finite Projective Spaces J. A. Thas H. Van Maldeghem 1 Introduction Definition 1.1 A (finite) generalized quadrangle (GQ) S = (P, B, I) is a point-line incidence

More information

The structure of quaternary quantum caps

The structure of quaternary quantum caps The structure of quaternary quantum caps Jürgen Bierbrauer Department of Mathematical Sciences Michigan Technological University Houghton, Michigan 49931 (USA) D. Bartoli, G. Faina, S. Marcugini and F.

More information

Security in Locally Repairable Storage

Security in Locally Repairable Storage 1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider

More information

Interactive protocols & zero-knowledge

Interactive protocols & zero-knowledge Interactive protocols & zero-knowledge - interactive protocols formalize what can be recognized by polynomial time restricted verifiers in arbitrary protocols - generalizes NP - zero-knowledge formalizes

More information

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015 L7. Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang, 5 March 2015 1 Outline The basic foundation: multiplicative group modulo prime The basic Diffie-Hellman (DH) protocol The discrete logarithm

More information

Characterizing Ideal Weighted Threshold Secret Sharing

Characterizing Ideal Weighted Threshold Secret Sharing Characterizing Ideal Weighted Threshold Secret Sharing Amos Beimel Tamir Tassa Enav Weinreb August 12, 2004 Abstract Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret

More information

Strongly Regular (:, ;)-Geometries

Strongly Regular (:, ;)-Geometries Journal of Combinatorial Theory, Series A 95, 234250 (2001) doi:10.1006jcta.2000.3164, available online at http:www.idealibrary.com on Strongly Regular (:, ;)-Geometries Nicholas Hamilton 1 Vakgroep Zuivere

More information

Identifying codes in vertex-transitive graphs and strongly regular graphs

Identifying codes in vertex-transitive graphs and strongly regular graphs Identifying codes in vertex-transitive graphs and strongly regular graphs Sylvain Gravier Institut Fourier University of Grenoble Grenoble, France sylvain.gravier@ujf-grenoble.fr Aline Parreau LIRIS University

More information

Perfect Secret Sharing Schemes Based on Generalized Kirkman Squares

Perfect Secret Sharing Schemes Based on Generalized Kirkman Squares Applied Mathematical Sciences, Vol. 6, 2012, no. 56, 2785-2790 Perfect Secret Sharing Schemes Based on Generalized Kirkman Squares Wang Changyuan School of Mathematics and Statistics Zaozhuang University,

More information

The minimum weight of dual codes from projective planes

The minimum weight of dual codes from projective planes The minimum weight of dual codes from projective planes J. D. Key Department of Mathematical Sciences Clemson University, University of Wales Aberystwyth, University of the Western Cape and University

More information

Discrete Mathematics and Probability Theory Fall 2014 Anant Sahai Note 7

Discrete Mathematics and Probability Theory Fall 2014 Anant Sahai Note 7 EECS 70 Discrete Mathematics and Probability Theory Fall 2014 Anant Sahai Note 7 Polynomials Polynomials constitute a rich class of functions which are both easy to describe and widely applicable in topics

More information

Dense near octagons with four points on each line, III

Dense near octagons with four points on each line, III Dense near octagons with four points on each line, III Bart De Bruyn Ghent University, Department of Pure Mathematics and Computer Algebra, Krijgslaan 281 (S22), B-9000 Gent, Belgium, E-mail: bdb@cage.ugent.be

More information